Threat Detection for Common MITRE ATT&CK Techniques

LogRhythm

If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on the new standard to assess the effectiveness of your security monitoring and alerting capabilities — the MITRE ATT&CK framework.
Watch Now

Spotlight

SQL injection is a form of attack that takes advantage of applications that generate SQL queries using user-supplied data without first checking or pre-processing it to verify that it is valid. The objective is to deceive the database system into running malicious code that will reveal sensitive information or otherwise compromise the server. By modifying the expected Web application parameters, an attacker can submit SQL queries and pass commands directly to the database. Many webpages take input from users, such as search terms, feedback comments or username and password and use them to build a SQL query which is passed to the database.

OTHER ON-DEMAND WEBINARS

Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps

Trend Micro

Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.
Watch Now

2022 IT Trends and Cybersecurity Challenges – Part 1

With each new year’s planning, organizations must deal with both new and longstanding trends that have an impact on their cybersecurity profiles. This process is made even more difficult by an increasingly sophisticated threat landscape and a chronic cyber-skills shortage that impacts all organizations.
Watch Now

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

This is Security: Nothing is what it SIEMs

Alert Logic

Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
Watch Now

Spotlight

SQL injection is a form of attack that takes advantage of applications that generate SQL queries using user-supplied data without first checking or pre-processing it to verify that it is valid. The objective is to deceive the database system into running malicious code that will reveal sensitive information or otherwise compromise the server. By modifying the expected Web application parameters, an attacker can submit SQL queries and pass commands directly to the database. Many webpages take input from users, such as search terms, feedback comments or username and password and use them to build a SQL query which is passed to the database.

resources